Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- Ask the CIO
- Connected Government
- Consolidating Mission-critical Systems
- Constituent Servicing
- Continuous Monitoring: Tools and Techniques for Trustworthy Government IT
- The Data Privacy Imperative: Safeguarding Sensitive Data
- Eliminating the Pitfalls: Steps to Virtualization in Government
- Federal Executive Forum
- Federal Tech Talk
- Government Cloud Brokerage: Who, What, When, Where, Why?
- Government Mobility
- Mission-critical Apps in the Cloud
- Mobile Device Management
- The Modern Federal Threat Landscape
- The Path from Legacy Systems
- Understanding the Intersection of Customer Service and Security in the Cloud
Shows & Panels
Monday - Friday, 6-9 a.m.
Hosts Tom Temin and Emily Kopp bring you the latest news affecting the federal community each weekday morning, featuring interviews with top government executives and contractors. Listen live from 6 to 9 a.m. or download archived interviews on our daily show blogs.
Cyberhacktivism threatens federal security
Tuesday - 4/20/2010, 9:25am EDT
- A new wave of cyber protest is threatening cyber security at the federal and corporate level. A new report by well-known botnet researcher Gunter Ollmann of computer security firm Damballa, looks at the recent trend toward politically motivated cyberprotests, sometimes called hacktivism. So far these organized attacks have been carried out against rival governments like Estonia and Georgia and large companies like Project Aurora, but the report warns these cyber-protests could be carried out by anyone. These attacks are difficult to defend because they don't necessarily involve true criminal behavior, and they could be carried out by their own customers. The growing popularity of social networks is making these target cyberprotests easier to organize and control, according to Ollmann. Darkreading.com says that as cyber protests continue to grow IT departments will have to set up some sort of counter attack.
- Could your old and discarded copier be a threat to your personal and corporate security? The answer is yes, according to new reports. Digital copiers built after 2002 are essentially computers that store an image of every document scanned, copied or emailed on a hard drive. Ever faxed your tax return from the office copier? Then your information is most likely stored on the hard drive. CBS reports the copier industry isn't stepping up about the hidden risk of personal identity theft.
- Keep a close eye on those passwords. It was a school-child, not a seasoned hacker, who broke into a Virginia school's record system. The school is Springhill Elementary in McLean, Virginia. And police say the 9-year old captured login credentials for the system from a teacher's desk and used the information to change passwords, homework assignments and class rosters. No charges have been filed.